Description
The The Discussion Board – WordPress Forum Plugin plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.5.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes.
Published: 2025-10-25
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary Shortcode Execution via WordPress Shortcodes
Action: Patch
AI Analysis

Impact

The vulnerability allows an authenticated user with Subscriber or higher privileges to insert and execute arbitrary WordPress shortcodes. The flaw arises because the plugin does not validate the shortcode value before passing it to do_shortcode, enabling the user to supply malicious code in the shortcode. Executing such a shortcode can lead to code execution, data exfiltration, or other malicious actions, as WordPress shortcodes can invoke a wide range of functions within the site.

Affected Systems

All installed versions of marketingfire’s Discussion Board – WordPress Forum Plugin up to and including 2.5.5 are affected. The plugin should be upgraded to any release newer than 2.5.5 to mitigate the issue.

Risk and Exploitability

The CVSS score of 6.3 reflects a moderate severity, while the EPSS score of less than 1% indicates a low probability of exploitation in the wild at the time of analysis. The flaw is not listed in the CISA KEV catalog. The likely attack vector is an authenticated user who has Subscriber-level access or higher; the attacker would log in with valid credentials or compromise an account to leverage the plugin’s shortcode execution feature. No public exploit is actively reported, but the consequence of successful exploitation includes full code execution on the affected WordPress site.

Generated by OpenCVE AI on April 21, 2026 at 02:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Discussion Board plugin to a version newer than 2.5.5
  • Restrict subscriber‑level users from executing shortcodes by adjusting plugin settings or removing the shortcode execution capability
  • Review the site content for unexpected or suspicious shortcodes and delete any that are unnecessary

Generated by OpenCVE AI on April 21, 2026 at 02:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Oct 2025 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Marketingfire
Marketingfire discussion Board
Wordpress
Wordpress wordpress
Vendors & Products Marketingfire
Marketingfire discussion Board
Wordpress
Wordpress wordpress

Mon, 27 Oct 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 25 Oct 2025 07:00:00 +0000

Type Values Removed Values Added
Description The The Discussion Board – WordPress Forum Plugin plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.5.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes.
Title Discussion Board – WordPress Forum Plugin <= 2.5.5 - Authenticated (Subscriber+) Arbitrary Shortcode Execution
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}


Subscriptions

Marketingfire Discussion Board
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:12:14.704Z

Reserved: 2025-08-01T18:20:55.297Z

Link: CVE-2025-8483

cve-icon Vulnrichment

Updated: 2025-10-27T15:40:14.971Z

cve-icon NVD

Status : Deferred

Published: 2025-10-25T07:15:41.540

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-8483

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T02:15:06Z

Weaknesses